AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications …
C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable …
T Wu, L Leng, MK Khan - Artificial Intelligence Review, 2023 - Springer
Direct usage of original biometric features/templates definitely leads to serious privacy leakage. In biometric cryptosystems, a biometric key is generated and then strictly protected …
P Campisi - Security and privacy in biometrics, 2013 - Springer
Security and privacy in biometric systems have been traditionally seen as two requirements hindering each other. Only in the recent past researchers have started investigating it as a …
Texture coding approach of palmprint biometric enjoys several merits; however, palmprint texture code suffers from alignment problem during matching, which hinders it from being …
C Rathgeb, A Uhl, P Wild - 2012 - books.google.com
Iris Biometrics: From Segmentation to Template Security provides critical analysis, challenges and solutions on recent iris biometric research topics, including image …
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and cryptosystem, where biometric provides authentication and cryptosystem imparts security …
W Ponce-Hernandez, R Blanco-Gonzalo… - IEEE …, 2020 - ieeexplore.ieee.org
As a consequence of the wide deployment of biometrics-based recognition systems, there are increasing concerns about the security of the sensitive information managed. Various …
N Riaz, A Riaz, SA Khan - Sensor Review, 2018 - emerald.com
Purpose The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns …